US20110088008A1 - Method for conversion of commercial microprocessor to radiation-hardened processor and resulting processor - Google Patents

Method for conversion of commercial microprocessor to radiation-hardened processor and resulting processor Download PDF

Info

Publication number
US20110088008A1
US20110088008A1 US12/579,159 US57915909A US2011088008A1 US 20110088008 A1 US20110088008 A1 US 20110088008A1 US 57915909 A US57915909 A US 57915909A US 2011088008 A1 US2011088008 A1 US 2011088008A1
Authority
US
United States
Prior art keywords
design
logic
seu
memory
ecc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/579,159
Inventor
John A. Fifield
Mark C. Hakey
Jason D. Hibbeler
James S. Nakos
Tak H. Ning
Kenneth P. Rodbell
Ronald D. Rose
Henry H.K. Tang
Larry Wissel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GlobalFoundries Inc
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US12/579,159 priority Critical patent/US20110088008A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HAKEY, MARK C., TANG, HENRY H.K., NING, TAK H., RODBELL, KENNETH P., Hibbeler, Jason D., NAKOS, JAMES S., ROSE, RONALD D., WISSEL, LARRY, FIFIELD, JOHN A.
Publication of US20110088008A1 publication Critical patent/US20110088008A1/en
Priority to US14/151,866 priority patent/US9646125B2/en
Assigned to GLOBALFOUNDRIES U.S. 2 LLC reassignment GLOBALFOUNDRIES U.S. 2 LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTERNATIONAL BUSINESS MACHINES CORPORATION
Assigned to GLOBALFOUNDRIES INC. reassignment GLOBALFOUNDRIES INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GLOBALFOUNDRIES U.S. 2 LLC, GLOBALFOUNDRIES U.S. INC.
Assigned to GLOBALFOUNDRIES U.S. INC. reassignment GLOBALFOUNDRIES U.S. INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: WILMINGTON TRUST, NATIONAL ASSOCIATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/30Circuit design
    • G06F30/39Circuit design at the physical level
    • G06F30/398Design verification or optimisation, e.g. using design rule check [DRC], layout versus schematics [LVS] or finite element methods [FEM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1008Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices
    • G06F11/1048Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices using arrangements adapted for a specific error detection or correction feature
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/30Circuit design
    • G06F30/32Circuit design at the digital level
    • G06F30/327Logic synthesis; Behaviour synthesis, e.g. mapping logic, HDL to netlist, high-level language to RTL or netlist
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/30Circuit design
    • G06F30/39Circuit design at the physical level

Definitions

  • the present invention relates to a method of converting commercial microprocessors to radiation-hardened processors and, more particularly, to a method to modify a commercial microprocessor for radiation-hardened applications with minimal changes to the technology, design, device, and process base so as to facilitate a rapid transition for such radiation-hardened applications, and the resulting microprocessor.
  • SEUs Single Event Upsets
  • ionizing radiation in space (and ground) based applications directly upsets storage circuits, such as DRAMs, SRAMs, register files and flip-flops.
  • radiation events in combinational logic create voltage glitches that can be latched.
  • SEUs may cause the circuit to perform incorrect or illegal operations; whereas, an accumulation of radiation over a long period of time may additionally lead to complete device failure.
  • the major radiation sources are high-energy protons and high-energy heavy ions (from helium up to about any heavy stable isotope).
  • the high-energy cosmic protons and ions are known to produce secondary fragments which cause SEUs and single event latchups (SELs), as well as total failure resulting from total dose (long accumulation of radiation) in semiconductor ICs.
  • Fluxes of cosmic protons and heavy ions can be estimated by models like Cosmic Ray Effects on Microelectronics (CREME) software packages.
  • a major source of radiation is from neutrons.
  • These terrestrial neutrons interact with the devices and the packaging materials to produce secondary (spallation) ions that cause upsets (mainly single event upsets SEUs).
  • the spectra of the secondary ions depend on the device back end of the line (BEOL) materials.
  • BEOL back end of the line
  • the terrestrial neutron flux has been measured and modeled very accurately.
  • man-made radiation environments are often generated near the microelectronics that control the detector systems, because the primary beam produces secondary particles (e.g., protons, heavy ions, pions and other particles) which can cause SEUs and SELs.
  • a method implemented in a computing infrastructure comprises evaluating a probability that one or more components of an existing commercial design will be affected by a single event upset (SEU). The method further comprises replacing the one or more components with a component immune to the SEU to create a final device.
  • SEU single event upset
  • a method comprises: evaluating a currently available design using modeling or simulation techniques to determine whether pulse spikes cause latch ups; flattening the design to a transistor-level and organizing it into channel-connected-components (CCCs); applying a variety of Single Event Transients (SETs) to each CCC resulting in a noise pulse at an output of the each CCC; using a signal-integrity analysis tool implemented in a computing infrastructure to propagate a resulting noise pulse through logic and to each of the latches; evaluating a width of the noise pulse at an input of each of the latches; evaluating a probability of capture by a clock edge and applying a logical masking factor; determining a probability of a logic failure based on a likelihood of a soft error propagating to and switching each of the latches; and replacing each of the latches having an estimated failure rate greater than a target percentage.
  • CCCs channel-connected-components
  • SETs Single Event Transients
  • a method comprises: obtaining an existing microprocessor design; targeting a low-power SOI process; performing a physical-design (PD) step with robust power distribution to provide immunity to neutron bursts; and at least one of: providing immunity to SEUs in logic portions of the microprocessor design; and providing immunity to SEUs in memory portions of the microprocessor design.
  • PD physical-design
  • a memory array comprises a multiple segment memory system which is protected by an ECC scheme used as a replacement for a memory device.
  • the multiple segment memory system transfers an ECC word to and from separate memory segments on global data lines, wherein bits of an ECC word are scattered among multiple wordlines.
  • the wordlines are located in separate memory segments such that physical locations of each ECC bit are separated thereby protecting the memory array from radiation induced errors.
  • a design structure is embodied in a machine-readable medium for designing, manufacturing, or testing an integrated circuit.
  • the design structure comprises the structures and methods of the present invention.
  • FIG. 1 shows an illustrative environment for implementing the steps in accordance with aspects of the invention
  • FIG. 2 shows a flow diagram used for example, in semiconductor IC logic design, in accordance with aspects of the invention
  • FIG. 3 shows a flow diagram describing the replacement of latches in non-array portions of an input design in accordance with aspects of the invention
  • FIG. 4 shows a two-bank memory system which is protected by a 137-bit ECC system in accordance with aspects of the present invention
  • FIG. 5 shows a detail of the array segment used in FIG. 4 ;
  • FIG. 6 shows a graph of oxide films comparing voltage shift as a function of total dose in accordance with aspects of the invention.
  • FIG. 7 is a flow diagram of a design process used in semiconductor design, manufacture, and/or test.
  • the present invention relates to a method of converting commercial microprocessors to radiation-hardened processors and, more particularly, to a method to modify a commercial microprocessor for radiation-hardened applications with minimal changes to the technology, design, device, and process base so as to facilitate a rapid transition for such radiation-hardened applications. More specifically, the present invention provides a method to modify a commercial microprocessor for space and military requirements with minimal changes to the technology, design, device, and process base. In embodiments, the method provides a specific adaptation of a 45 nm technology as an example; however, the method equally provides specific adaptation for other technology nodes.
  • the present invention makes optimum use of existing state-of-the-art commercial capabilities produced in high volumes.
  • the present invention uses a unique commercial manufacturing base combined with specially hardened devices with interleaved layouts to save area, a minimum number of process changes with no tooling changes, a design modified to optimize key reliability parameters for space, and/or a particular layout for ECC to minimize the effects of the multi-bit errors caused by heavy ion hits in space.
  • the present invention obtains a high-performance microprocessor that is immune to terrestrial and non-terrestrial sources of high-energy radiation.
  • EDA Electronic Design Automation
  • PCBs printed circuit boards
  • the designer e.g., program control
  • conversions e.g., processes or hardened components
  • the present invention can modify commercial technologies to a lower-power nominal design point.
  • the present invention can provide a low-power derivative of SOI (LPSOI) CMOS for fabricating the radiation hardened microprocessor.
  • LPSOI low-power derivative of SOI
  • other criteria may be to insure the device is latch-up free, e.g., convert the technology to SOI (which is latch-up free).
  • another criteria may be to convert the microprocessor resistance to neutron bursts of energy, e.g., simulating a nuclear detonation.
  • Another criterion may be, for example, to compensate for total ionizing dose which can be improved for back-channel leakage in SOI by incorporation of the radiation-hardened buried oxide, with lateral isolation improvements.
  • the present invention may incorporate radiation-hard elements into a commercial microprocessor.
  • a stacked device e.g., a two-FET device with the FETs connected in series to function as a single device, can be used to replace a regular device in critical nodes to provide SEU immunity from heavy ion upsets.
  • a stacked device in SOI technologies is immune to SEU as it includes an insulating layer of silicon between the adjacent FETs. This can be done most easily at the design level by replacing the critical FETs with the SEU-immune stacked devices.
  • the present invention can evaluate the SEU performance of the array elements for SEUs including low-ionization-energy effects in order to augment memory arrays.
  • an Error-Correcting Code (ECC) scheme in the arrays can be augmented to the degree to meet SEUs and meet less than 1e-10 fails per bit day or better depending on system requirements.
  • ECC Error-Correcting Code
  • the present invention can include ECC in smaller arrays which do not currently have ECC. The resulting processor will be radiation hard and will meet the needs for virtually all current and proposed processor applications for power, performance, and function.
  • the present invention can include the following steps for converting an existing microprocessor design to a version that is immune to single-event upsets (SEUs). These steps can include, for example,
  • the present invention may be embodied as a system, method or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, the present invention may take the form of a computer program product embodied in any tangible medium of expression having computer-usable program code embodied in the medium.
  • the computer-usable or computer-readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following:
  • the computer-usable or computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
  • a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • the computer-usable medium may include a propagated data signal with the computer-usable program code embodied therewith, either in baseband or as part of a carrier wave.
  • the computer usable program code may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc.
  • Computer program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any type of network. This may include, for example, a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • LAN local area network
  • WAN wide area network
  • Internet Service Provider for example, AT&T, MCI, Sprint, EarthLink, MSN, GTE, etc.
  • FIG. 1 shows an illustrative environment 10 for managing the processes in accordance with the invention.
  • the environment 10 includes a server or other computing system 12 that can perform the processes described herein.
  • the server 12 includes a computing device 14 .
  • the computing device 14 can be resident on a network infrastructure or computing device of a third-party service provider (any of which is generally represented in FIG. 1 ).
  • the computing device 14 includes a processor 20 , memory 22 A, an I/O interface 24 , and a bus 26 .
  • the memory 22 A can include local memory employed during actual execution of program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
  • the bus 26 provides a communications link between each of the components in the computing device 14 .
  • the computing device includes random access memory (RAM), a read-only memory (ROM), and an operating system (O/S).
  • the processor 20 executes computer program code (e.g., program control 44 ), which can be stored in the memory 22 A and/or storage system 22 B.
  • the program control 44 controls and/or executes the processes of the invention. While executing the computer program code, the processor 20 can read and/or write data to/from memory 22 A, storage system 22 B, and/or I/O interface 24 .
  • the computing device 14 is in communication with the external I/O device/resource 28 and the storage system 22 B.
  • the I/O device 28 can comprise any device that enables an individual to interact with the computing device 14 or any device that enables the computing device 14 to communicate with one or more other computing devices using any type of communications link.
  • the external I/O device/resource 28 may be for example, a handheld device, PDA, handset, keyboard, etc.
  • the computing device 14 further includes one or more analysis/simulation/modeling and/or design tools 25 .
  • the tool 25 can be an EDA application, analysis tool, modeling tool and/or simulation tool implemented as one or more program code in the program control 44 stored in the memory 22 A as separate or combined modules.
  • chip designs, hardened components, elements, etc. may be stored in the storage system 22 B, which may be, for example, a database.
  • the computing device 14 can also comprise any general purpose computing article of manufacture capable of executing computer program code installed thereon (e.g., a personal computer, server, etc.). However, it is understood that the computing device 14 is only representative of various possible equivalent-computing devices that may perform the processes described herein. To this extent, in embodiments, the functionality provided by the computing device 14 can be implemented by a computing article of manufacture that includes any combination of general and/or specific purpose hardware and/or computer program code. In each embodiment, the program code and hardware can be created using standard programming and engineering techniques, respectively.
  • the computing infrastructure 12 is only illustrative of various types of computer infrastructures for implementing the invention.
  • the server 12 comprises two or more computing devices (e.g., a server cluster) that communicate over any type of communications link, such as a network, a shared memory, or the like, to perform the process described herein.
  • any type of communications link such as a network, a shared memory, or the like.
  • one or more computing devices on the server 12 can communicate with one or more other computing devices external to the server 12 using any type of communications link.
  • the communications link can comprise any combination of wired and/or wireless links; any combination of one or more types of networks (e.g., the Internet, a wide area network, a local area network, a virtual private network, etc.); and/or utilize any combination of transmission techniques and protocols.
  • networks e.g., the Internet, a wide area network, a local area network, a virtual private network, etc.
  • FIGS. 2 and 3 illustrate a process flow in accordance with aspects of the invention.
  • the steps of FIGS. 2 and 3 may be implemented in the environment of FIG. 1 , for example.
  • the flow diagrams may equally represent a high-level block diagram or a swim-lane diagram of the invention.
  • the flowchart and/or block diagrams in FIGS. 2 and 3 illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention.
  • each block in the flowchart, block diagram or swim-lane diagram may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
  • FIG. 2 shows a flow diagram used, for example, in semiconductor IC logic design in accordance with aspects of the invention.
  • an existing microprocessor design is obtained.
  • the design may be, for example, Verilog/VHDL or other type of schematic.
  • the user e.g., program control
  • the reliability grade can be, for example, a numerical score (e.g., 1-5), where 1 is the highest grade (most reliability).
  • the reliability grade may be based on a desired radiation hardness required by the design and, in embodiments, may take into account many different trade-offs such as, for example, cost, efficiency and size of the final design. In more specific examples, factors to consider for the reliability grade may include, amongst others:
  • Optional step 210 is provided specifically for a memory array.
  • the present invention can use an Error Correction Code (ECC) scheme for a DRAM or SRAM in order to improve robustness of the memory array, e.g., reliability of the memory.
  • ECC Error Correction Code
  • the present invention can use a novel ECC scheme to improve the radiation immunity of DRAM or SRAM memory chips.
  • the ECC is denser than a stacked transistor memory cell, but will use more power than the stacked transistor memory cell. A detailed discussion of the ECC scheme is described with reference to FIGS. 4 and 5 .
  • Step 215 a design choice can be selected by the program control, based on the selected reliability grade.
  • Step 215 can include, for example, providing immunity to SEUs in the logic portions of the commercial design by identifying key devices and substituting them with an SEU-immune device or by substituting every logic gate in all or part of the design with a functionally equivalent gate composed of SEU-immune devices.
  • the design can include, amongst other substitutions: a triple modular redundancy; substitution of every transistor by a stacked device for complementary CMOS gates (e.g., as disclosed in application Ser. No. 12/408,205, filed on Mar.
  • the program control selects a process enhancement such as, for example, silicon-rich-oxide (SRO) film.
  • SRO silicon-rich-oxide
  • the SRO film can be an efficient and reliable tunneling injector for the low voltage application in a flash memory cell.
  • electrons (negative charges) and holes (positive charges) are generated within a oxide layer.
  • some of the generated charges can accumulate in the oxide layer and cause degradation in device characteristics, resulting in the circuits not to function properly.
  • the charges generated in it can leak out readily with negligible net charge accumulation in the oxide layer.
  • the chip is fabricated, using the selected design. The resulting combination will provide radiation hardened chips with much better combined power, density, function, and reliability than is available using currently used methods. The method is also scalable and will provide cost savings without the need for large capital investment and extensive and unique process development.
  • FIG. 3 shows a flow diagram describing the replacement of latches in non-array portions of an input design in accordance with aspects of the invention.
  • the evaluation of the circuits can be repeated to evaluate charged particles from each known source.
  • These sources can be, for example: (i) fragments from neutron interactions; (ii) alpha particles; (iii) wafer materials background; (iv) solder bump materials; and/or (v) packaging materials, amongst other sources.
  • the steps of FIG. 3 are performed using an estimate of the number of particles of different types emitted by the sources in (i)-(v) above.
  • the program control will obtain a commercially available design.
  • the program control uses charge-collection modeling, bipolar modeling, and/or circuit simulation to estimate amplitudes of Single Event Transients (SETs).
  • the modeling and/or simulation are represented by the tool 25 of FIG. 1 .
  • the modeling and/or simulation are designed to determine the narrow pulse created by charge collected in combinational logic and captured by a clock edge, and the frequency of occurrence of the SETs.
  • an analysis tool such as, for example, Synopsys Primetime SI, can determine if pulse spikes propagate to an interconnect, gate silicon and inverter to a latch data input. If so, the program control can check whether the latch data input is being clocked to determine if the latch should be replaced.
  • soft errors in logic circuits may be filtered out by the circuit itself and may not affect the circuit performance if the noise pulse hits a non-controlling pin to a logic gate. For instance, if a two input NAND gate has a 0 on one input, a 1 will be produced on the output, regardless of any input on the other input pin. Accordingly, it does not matter if the other input pin is subject to large or little noise, as that noise will be filtered and will not appear on the output of the NAND gate. Not taking this noise-filtering into account will make a failure analysis too conservative, and may improperly increase the determined probability of failure at a latch.
  • the method of masking fails due to the state of the logic includes using switching factors or switching activity values to calculate a probability that any input will be in a controlling or non-controlling state.
  • the program control of the present invention will use the same type of masking to determine switching probability as used in power analysis.
  • the program control will flatten the circuit under test to the transistor-level and organize it into channel-connected-components (CCCs).
  • the program control will apply a variety of SETs to each CCC (appropriate for each CCC), each resulting in a noise pulse at the output of the CCC.
  • the program control will use a signal-integrity analysis tool (also represented as tool 25 of FIG. 1 ), improved with the use of current-source models for the CCC, to propagate the resulting noise pulse through logic and to latches.
  • the program control will evaluate the width of the SET noise pulse at the input of a latch.
  • the program control will evaluate the probability of capture by a clock edge and apply a logic masking factor.
  • Logic masking factors may be determined from a variety of sources, including, for example: the use of simulation data to determine the probability that any signal is in a controlling or non-controlling state; the use of global switching factors to estimate the probability that any logic signal is in a controlling or non-controlling state; or per-instance estimated factors, which relate an individual noisy input signal to the number of other inputs to a circuit it propagates to, to compute a probability that the other inputs may be in a non-controlling state. For instance, with a 2 input NAND circuit, the other input has a 1 ⁇ 2 probability of being non-controlling, and the factor would be 1 ⁇ 2. A 3 input NAND would have a factor of 1 ⁇ 4; etc.
  • the program control will determine the probability of a logic failure based on the likelihood of a soft error propagating to and switching each latch.
  • the program control will accumulate results for each instance (i)-(v) to obtain a failure estimate for each latch.
  • the program control will replace each latch having an estimated failure rate greater than the target percentage.
  • the target percentage may be a user-defined percentage.
  • the replacement of latches in the non-array portions of the input design may be based on the reliability grade selected by the program control or designer, as discussed above.
  • the reliability grade selected by the program control or designer may be replaced by a stacked device.
  • the latches with a functionally equivalent latch having stacked devices or a DICE latches that have a likelihood of failure >x % will be replaced.
  • the value of “x” can be a user-defined percentage describing the degree of desired “hardening”.
  • FIG. 4 shows a two-bank memory system protected by a 137-bit ECC scheme in accordance with aspects of the present invention.
  • the two-bank memory system shown in FIG. 4 can be used as a replacement for a memory device, in step 210 of FIG. 2 .
  • recovery from a single error is possible by using a two dimensional array to store data bits in different word lines that are spaced far apart in order to spread data over a large area.
  • SEU single event upsets
  • DRAM dynamic random access memory
  • SRAM static random access memory
  • ECC Error Correction Code
  • SEC/DEC single error correct and double error correct
  • 8-groups of separate ECC words are interdigitated along a 1096 bit word line, and arranged so the 137-bits defining one electrical ECC word are separated by 8-physical bits.
  • a single SEU can affect up to 8 adjacent DRAM cells and still be correctable by the SEC/DEC system.
  • the memory architecture shown in FIG. 4 comprises an ECC word stored in a two-dimensional space to minimize SEU effects on a DRAM array.
  • the interdigitation technique is augmented by spacing out the electrical locations of a single ECC word to several word lines residing in several array segments.
  • FIG. 4 shows a two-bank memory system (e.g., Bank A and Bank B) protected by a 137-bit ECC system 400 designed to transfer an ECC word to and from the memory banks on an overhead global data line.
  • the 137 bit ECC system includes 9 check bits.
  • the 137-bit ECC word 400 has a first bit, B 1 , located in array segment 3 , and subsequent bits B 2 , B 3 , B 4 are located in array segments 2 , 1 and 0 , respectively.
  • the 137-bit ECC word 400 has a first bit, B 5 , located in array segment 3 , and subsequent bits B 6 , B 7 , B 8 are located in array segments 2 , 1 and 0 , respectively.
  • the physical locations of each bit are scattered along an array wordline segment and across a plurality of array segments such that a SEU is unlikely to affect more than 1 bit with the ECC word.
  • the ECC protected memory architecture has the improvement over the known systems of simply storing the ECC word in interdigitated locations along a word line. That is, in this configuration, the physical location of an electrical ECC word can be spread out within a memory array in a two-dimensional fashion to minimize the effects of radiation. In this manner, the SEU damage is confined to a single bit residing in several ECC words and is therefore recoverable by a SEC/DEC system (because the ECC word is spread out over several array segments). (This is compared to a conventional system where in a SEU, an electron cloud could affect the data integrity of a large group of memory cells within a single ECC word.)
  • FIG. 5 shows a detail of the array segment used in FIG. 4 .
  • a 1-of-4 decode is performed by a column select signal Ac ⁇ 1:0> to select a DRAM cell location within the array segments.
  • an overhead global data line 500 is connected to 1-of-4 MUX devices 505 and column select logic to select a particular sense amp 510 and bit line pair 515 .
  • the MUX devices 505 are responsive to a column decode 520 controlled by addresses Ac ⁇ 1:0>, and also allow data to pass from the sense amps 510 to the global data line 500 .
  • a particular memory cell 525 is selected along a true/complement pair of array bit lines by the word decoder 530 with input Aw ⁇ 3:0>.
  • Using multiple of these array segments allows an ECC word to be scattered across a multiple bank memory array to minimize the effects of a SEU and can essentially eliminate data loss from a SEU event.
  • the total ionizing dose (TID) resistance can be provided by use of a method to reduce backchannel and lateral isolation leakage.
  • a method to reduce backchannel and lateral isolation leakage can be used.
  • SRO Silicon Rich Oxide
  • liners in the STI fill can be used.
  • TID enhancement can include the deposition of High Refractive Index Silicon Rich Silicon Dioxide using an AMAT 5000 HDP (High Density Plasma) system.
  • the leakage properties of this silicon rich oxide film are far superior to conventional SiO 2 following Total Ionizing Dose exposure (see, e.g., FIG. 6 ).
  • the SRO has no known harmful effects on NFET and PFET leakage characteristics and greatly improves the TID results.
  • FIG. 7 shows a block diagram of an exemplary design flow 900 used for example, in semiconductor IC logic design, simulation, test, layout, and manufacture.
  • Design flow 900 includes processes, machines and/or mechanisms for processing design structures or devices to generate logically or otherwise functionally equivalent representations of the design structures and/or devices described above and shown in FIGS. 1-5 , for example.
  • the design structures processed and/or generated by design flow 900 may be encoded on machine-readable transmission or storage media to include data and/or instructions that when executed or otherwise processed on a data processing system generate a logically, structurally, mechanically, or otherwise functionally equivalent representation of hardware components, circuits, devices, or systems.
  • Machines include, but are not limited to, any machine used in an IC design process, such as designing, manufacturing, or simulating a circuit, component, device, or system.
  • machines may include: lithography machines, machines and/or equipment for generating masks (e.g. e-beam writers), computers or equipment for simulating design structures, any apparatus used in the manufacturing or test process, or any machines for programming functionally equivalent representations of the design structures into any medium (e.g. a machine for programming a programmable gate array).
  • Design flow 900 may vary depending on the type of representation being designed. For example, a design flow 900 for building an application specific IC (ASIC) may differ from a design flow 900 for designing a standard component or from a design flow 900 for instantiating the design into a programmable array, for example a programmable gate array (PGA) or a field programmable gate array (FPGA) offered by Altera® Inc. or Xilinx® Inc.
  • ASIC application specific IC
  • PGA programmable gate array
  • FPGA field programmable gate array
  • FIG. 7 illustrates multiple such design structures including an input design structure 920 that is preferably processed by a design process 910 .
  • Design structure 920 may be a logical simulation design structure generated and processed by design process 910 to produce a logically equivalent functional representation of a hardware device.
  • Design structure 920 may also or alternatively comprise data and/or program instructions that when processed by design process 910 , generate a functional representation of the physical structure of a hardware device. Whether representing functional and/or structural design features, design structure 920 may be generated using electronic computer-aided design (ECAD) such as implemented by a core developer/designer.
  • ECAD electronic computer-aided design
  • design structure 920 When encoded on a machine-readable data transmission, gate array, or storage medium, design structure 920 may be accessed and processed by one or more hardware and/or software modules within design process 910 to simulate or otherwise functionally represent an electronic component, circuit, electronic or logic module, apparatus, device, or system such as those shown in FIGS. 1-5 , for example.
  • design structure 920 may comprise files or other data structures including human and/or machine-readable source code, compiled structures, and computer-executable code structures that when processed by a design or simulation data processing system, functionally simulate or otherwise represent circuits or other levels of hardware logic design.
  • Such data structures may include hardware-description language (HDL) design entities or other data structures conforming to and/or compatible with lower-level HDL design languages such as Verilog and VHDL, and/or higher level design languages such as C or C++.
  • HDL hardware-description language
  • Design process 910 preferably employs and incorporates hardware and/or software modules for synthesizing, translating, or otherwise processing a design/simulation functional equivalent of the components, circuits, devices, or logic structures shown in FIGS. 1-5 , for example, to generate a netlist 980 which may contain design structures such as design structure 920 .
  • Netlist 980 may comprise, for example, compiled or otherwise processed data structures representing a list of wires, discrete components, logic gates, control circuits, I/O devices, models, etc. that describes the connections to other elements and circuits in an integrated circuit design.
  • Netlist 980 may be synthesized using an iterative process in which netlist 980 is resynthesized one or more times depending on design specifications and parameters for the device.
  • netlist 980 may be recorded on a machine-readable data storage medium or programmed into a programmable gate array.
  • the medium may be a non-volatile storage medium such as a magnetic or optical disk drive, a programmable gate array, a compact flash, or other flash memory. Additionally, or in the alternative, the medium may be a system or cache memory, buffer space, or electrically or optically conductive devices and materials on which data packets may be transmitted and intermediately stored via the Internet, or other networking suitable means.
  • Design process 910 may include hardware and software modules for processing a variety of input data structure types including netlist 980 .
  • data structure types may reside, for example, within library elements 930 and include a set of commonly used elements, circuits, and devices, including models, layouts, and symbolic representations, for a given manufacturing technology (e.g., different technology nodes, 32 nm, 45 nm, 90 nm, etc.).
  • the data structure types may further include design specifications 940 , characterization data 950 , verification data 960 , design rules 970 , and test data files 985 which may include input test patterns, output test results, and other testing information.
  • Design process 910 may further include, for example, standard mechanical design processes such as stress analysis, thermal analysis, mechanical event simulation, process simulation for operations such as casting, molding, and die press forming, etc.
  • standard mechanical design processes such as stress analysis, thermal analysis, mechanical event simulation, process simulation for operations such as casting, molding, and die press forming, etc.
  • One of ordinary skill in the art of mechanical design can appreciate the extent of possible mechanical design tools and applications used in design process 910 without deviating from the scope and spirit of the invention.
  • Design process 910 may also include modules for performing standard circuit design processes such as timing analysis, verification, design rule checking, place and route operations, etc.
  • Design process 910 employs and incorporates logic and physical design tools such as HDL compilers and simulation model build tools to process design structure 920 together with some or all of the depicted supporting data structures along with any additional mechanical design or data (if applicable), to generate a second design structure 990 .
  • Design structure 990 resides on a storage medium or programmable gate array in a data format used for the exchange of data of mechanical devices and structures (e.g. information stored in a IGES, DXF, Parasolid XT, JT, DRG, or any other suitable format for storing or rendering such mechanical design structures).
  • design structure 990 preferably comprises one or more files, data structures, or other computer-encoded data or instructions that reside on transmission or data storage media and that when processed by an ECAD system generate a logically or otherwise functionally equivalent form of one or more of the embodiments of the invention shown in FIGS. 1-5 , for example.
  • design structure 990 may comprise a compiled, executable HDL simulation model that functionally simulates the devices shown in FIGS. 1-5 , for example.
  • Design structure 990 may also employ a data format used for the exchange of layout data of integrated circuits and/or symbolic data format (e.g. information stored in a GDSII (GDS2), GL1, OASIS, map files, or any other suitable format for storing such design data structures).
  • Design structure 990 may comprise information such as, for example, symbolic data, map files, test data files, design content files, manufacturing data, layout parameters, wires, levels of metal, vias, shapes, data for routing through the manufacturing line, and any other data required by a manufacturer or other designer/developer to produce a device or structure as described above and shown in FIGS. 1-5 , for example.
  • Design structure 990 may then proceed to a stage 995 where, for example, design structure 990 : proceeds to tape-out, is released to manufacturing, is released to a mask house, is sent to another design house, is sent back to the customer, etc.
  • the method as described above is used in the fabrication of integrated circuit chips.
  • the resulting integrated circuit chips can be distributed by the fabricator in raw wafer form (that is, as a single wafer that has multiple unpackaged chips), as a bare die, or in a packaged form.
  • the chip is mounted in a single chip package (such as a plastic carrier, with leads that are affixed to a motherboard or other higher level carrier) or in a multichip package (such as a ceramic carrier that has either or both surface interconnections or buried interconnections).
  • the chip is then integrated with other chips, discrete circuit elements, and/or other signal processing devices as part of either (a) an intermediate product, such as a motherboard, or (b) an end product.
  • the end product can be any product that includes integrated circuit chips, ranging from toys and other low-end applications to advanced computer products having a display, a keyboard or other input device, and a central processor.

Abstract

A method is provided to convert commercial microprocessors to radiation-hardened processors and, more particularly, a method is provided to modify a commercial microprocessor for radiation hardened applications with minimal changes to the technology, design, device, and process base so as to facilitate a rapid transition for such radiation hardened applications. The method is implemented in a computing infrastructure and includes evaluating a probability that one or more components of an existing commercial design will be affected by a single event upset (SEU). The method further includes replacing the one or more components with a component immune to the SEU to create a final device.

Description

    FIELD OF THE INVENTION
  • The present invention relates to a method of converting commercial microprocessors to radiation-hardened processors and, more particularly, to a method to modify a commercial microprocessor for radiation-hardened applications with minimal changes to the technology, design, device, and process base so as to facilitate a rapid transition for such radiation-hardened applications, and the resulting microprocessor.
  • BACKGROUND
  • Currently available microprocessors designed for space and military applications do not meet the performance and functional requirement integrated circuits of many proposed new systems. For example, the current offerings from manufacturers of military and space components are limited to technologies circa 150 nm and above. These offerings are limited by the intrinsic capabilities of the semiconductor facilities being used, with investment to get those fabs to state-of-the-art manufacturing being in the hundreds of millions of dollars and the operating costs and sustaining engineering costs making the investment unaffordable even for the government.
  • However, commercially available microprocessors meet the performance and function requirements of such space and military applications, but are not radiation hardened sufficiently for these applications. For example, commercial integrated circuits have higher performance, function, and density compared with integrated circuits designed for space and military applications; however, designs for such commercial integrated circuits result in failure caused by Single Event Upsets (SEUs) in space applications. For example, ionizing radiation in space (and ground) based applications directly upsets storage circuits, such as DRAMs, SRAMs, register files and flip-flops. Moreover, radiation events in combinational logic create voltage glitches that can be latched. Also, SEUs may cause the circuit to perform incorrect or illegal operations; whereas, an accumulation of radiation over a long period of time may additionally lead to complete device failure.
  • In space applications, the major radiation sources are high-energy protons and high-energy heavy ions (from helium up to about any heavy stable isotope). The high-energy cosmic protons and ions are known to produce secondary fragments which cause SEUs and single event latchups (SELs), as well as total failure resulting from total dose (long accumulation of radiation) in semiconductor ICs. Fluxes of cosmic protons and heavy ions can be estimated by models like Cosmic Ray Effects on Microelectronics (CREME) software packages.
  • For applications on the ground, a major source of radiation is from neutrons. These terrestrial neutrons interact with the devices and the packaging materials to produce secondary (spallation) ions that cause upsets (mainly single event upsets SEUs). The spectra of the secondary ions depend on the device back end of the line (BEOL) materials. The terrestrial neutron flux has been measured and modeled very accurately. In modern nuclear physics and high-energy physics experiments, man-made radiation environments are often generated near the microelectronics that control the detector systems, because the primary beam produces secondary particles (e.g., protons, heavy ions, pions and other particles) which can cause SEUs and SELs.
  • These upsets, e.g., SEUs, SELs multibit upsets (MBUs), single-bit failures and total failure, have been observed for currently available commercial device configurations (e.g., 65 nm, 45 nm, etc.). Minimizing the occurrence of such upsets with minimal change to design and process would allow the use of close derivatives of commercial components with close to commercial performance, function, and density with a minimal schedule delay. Thus, a new solution is required which meets the needs for performance and function and which also provides adequate radiation tolerance, at minimal cost and changes in current processes and designs.
  • Accordingly, there exists a need in the art to overcome the deficiencies and limitations described hereinabove.
  • SUMMARY
  • In a first aspect of the invention, a method implemented in a computing infrastructure comprises evaluating a probability that one or more components of an existing commercial design will be affected by a single event upset (SEU). The method further comprises replacing the one or more components with a component immune to the SEU to create a final device.
  • In another aspect of the invention, a method comprises: evaluating a currently available design using modeling or simulation techniques to determine whether pulse spikes cause latch ups; flattening the design to a transistor-level and organizing it into channel-connected-components (CCCs); applying a variety of Single Event Transients (SETs) to each CCC resulting in a noise pulse at an output of the each CCC; using a signal-integrity analysis tool implemented in a computing infrastructure to propagate a resulting noise pulse through logic and to each of the latches; evaluating a width of the noise pulse at an input of each of the latches; evaluating a probability of capture by a clock edge and applying a logical masking factor; determining a probability of a logic failure based on a likelihood of a soft error propagating to and switching each of the latches; and replacing each of the latches having an estimated failure rate greater than a target percentage.
  • In yet another aspect of the invention, a method comprises: obtaining an existing microprocessor design; targeting a low-power SOI process; performing a physical-design (PD) step with robust power distribution to provide immunity to neutron bursts; and at least one of: providing immunity to SEUs in logic portions of the microprocessor design; and providing immunity to SEUs in memory portions of the microprocessor design.
  • In another aspect of the invention, a memory array comprises a multiple segment memory system which is protected by an ECC scheme used as a replacement for a memory device. The multiple segment memory system transfers an ECC word to and from separate memory segments on global data lines, wherein bits of an ECC word are scattered among multiple wordlines. The wordlines are located in separate memory segments such that physical locations of each ECC bit are separated thereby protecting the memory array from radiation induced errors.
  • In yet another aspect of the invention, a design structure is embodied in a machine-readable medium for designing, manufacturing, or testing an integrated circuit. The design structure comprises the structures and methods of the present invention.
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
  • The present invention is described in the detailed description which follows, in reference to the noted plurality of drawings by way of non-limiting examples of exemplary embodiments of the present invention.
  • FIG. 1 shows an illustrative environment for implementing the steps in accordance with aspects of the invention;
  • FIG. 2 shows a flow diagram used for example, in semiconductor IC logic design, in accordance with aspects of the invention;
  • FIG. 3 shows a flow diagram describing the replacement of latches in non-array portions of an input design in accordance with aspects of the invention;
  • FIG. 4 shows a two-bank memory system which is protected by a 137-bit ECC system in accordance with aspects of the present invention;
  • FIG. 5 shows a detail of the array segment used in FIG. 4;
  • FIG. 6 shows a graph of oxide films comparing voltage shift as a function of total dose in accordance with aspects of the invention; and
  • FIG. 7 is a flow diagram of a design process used in semiconductor design, manufacture, and/or test.
  • DETAILED DESCRIPTION
  • The present invention relates to a method of converting commercial microprocessors to radiation-hardened processors and, more particularly, to a method to modify a commercial microprocessor for radiation-hardened applications with minimal changes to the technology, design, device, and process base so as to facilitate a rapid transition for such radiation-hardened applications. More specifically, the present invention provides a method to modify a commercial microprocessor for space and military requirements with minimal changes to the technology, design, device, and process base. In embodiments, the method provides a specific adaptation of a 45 nm technology as an example; however, the method equally provides specific adaptation for other technology nodes.
  • Advantageously, the present invention makes optimum use of existing state-of-the-art commercial capabilities produced in high volumes. The present invention uses a unique commercial manufacturing base combined with specially hardened devices with interleaved layouts to save area, a minimum number of process changes with no tooling changes, a design modified to optimize key reliability parameters for space, and/or a particular layout for ECC to minimize the effects of the multi-bit errors caused by heavy ion hits in space. In this way, the present invention obtains a high-performance microprocessor that is immune to terrestrial and non-terrestrial sources of high-energy radiation.
  • To accomplish the advantages of the present invention, e.g., which elements to replace in a commercial chip design to meet specific requirements, Electronic Design Automation (EDA) and/or other analysis/simulation and/or modeling tools can be implemented with the present invention. As should be understood by those of skill in the art, EDA is a category of software applications for designing and producing electronic systems ranging from printed circuit boards (PCBs) to integrated circuits. In embodiments, the designer (e.g., program control) can analyze the requirements of the chip design and, depending on the reliability grade, make one or more conversions, e.g., processes or hardened components, to meet such requirements.
  • In further embodiments, to meet power requirements in space, the present invention can modify commercial technologies to a lower-power nominal design point. For example, the present invention can provide a low-power derivative of SOI (LPSOI) CMOS for fabricating the radiation hardened microprocessor. In further implementations, other criteria may be to insure the device is latch-up free, e.g., convert the technology to SOI (which is latch-up free). In still further implementations, another criteria may be to convert the microprocessor resistance to neutron bursts of energy, e.g., simulating a nuclear detonation. Another criterion may be, for example, to compensate for total ionizing dose which can be improved for back-channel leakage in SOI by incorporation of the radiation-hardened buried oxide, with lateral isolation improvements.
  • To compensate for SEU, the present invention may incorporate radiation-hard elements into a commercial microprocessor. For example, in the case of SOI technologies, a stacked device, e.g., a two-FET device with the FETs connected in series to function as a single device, can be used to replace a regular device in critical nodes to provide SEU immunity from heavy ion upsets. A stacked device in SOI technologies is immune to SEU as it includes an insulating layer of silicon between the adjacent FETs. This can be done most easily at the design level by replacing the critical FETs with the SEU-immune stacked devices. In further embodiments, the present invention can evaluate the SEU performance of the array elements for SEUs including low-ionization-energy effects in order to augment memory arrays. For example, an Error-Correcting Code (ECC) scheme in the arrays can be augmented to the degree to meet SEUs and meet less than 1e-10 fails per bit day or better depending on system requirements. Also, in embodiments, the present invention can include ECC in smaller arrays which do not currently have ECC. The resulting processor will be radiation hard and will meet the needs for virtually all current and proposed processor applications for power, performance, and function.
  • In more specific embodiments, the present invention can include the following steps for converting an existing microprocessor design to a version that is immune to single-event upsets (SEUs). These steps can include, for example,
      • obtain an existing microprocessor design;
      • target a low-power SOI process;
      • perform a physical-design (PD) step with robust power distribution to provide immunity to neutron bursts;
      • provide immunity to SEUs in logic portions of the microprocessor design (by identifying key devices and substituting them with an SEU-immune stacked device or by substituting every logic gate in the all or part of the design with a functionally equivalent gate composed of SEU-immune stacked devices); and
      • provide immunity to SEUs in memory portions of the microprocessor design (by using an error correcting code (ECC) scheme to reduce sensitivity to failure of adjacent FETs in the peripheral logic of the arrays).
        In this implementation, the ECC memory architecture would have multiple array segments each having a plurality of wordlines and bitlines and sense amplifiers connected to data lines which are shared between the array segments.
    System Environment
  • As will be appreciated by one skilled in the art, the present invention may be embodied as a system, method or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, the present invention may take the form of a computer program product embodied in any tangible medium of expression having computer-usable program code embodied in the medium.
  • Any combination of one or more computer usable or computer readable medium(s) may be utilized. The computer-usable or computer-readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following:
      • an electrical connection having one or more wires,
      • a portable computer diskette,
      • a hard disk,
      • a random access memory (RAM),
      • a read-only memory (ROM),
      • an erasable programmable read-only memory (EPROM or Flash memory),
      • an optical fiber,
      • a portable compact disc read-only memory (CDROM),
      • an optical storage device,
      • a transmission media such as those supporting the Internet or an intranet, or
      • a magnetic storage device.
  • The computer-usable or computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
  • In the context of this document, a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The computer-usable medium may include a propagated data signal with the computer-usable program code embodied therewith, either in baseband or as part of a carrier wave. The computer usable program code may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc.
  • Computer program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network. This may include, for example, a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • FIG. 1 shows an illustrative environment 10 for managing the processes in accordance with the invention. To this extent, the environment 10 includes a server or other computing system 12 that can perform the processes described herein. In particular, the server 12 includes a computing device 14. The computing device 14 can be resident on a network infrastructure or computing device of a third-party service provider (any of which is generally represented in FIG. 1).
  • The computing device 14 includes a processor 20, memory 22A, an I/O interface 24, and a bus 26. The memory 22A can include local memory employed during actual execution of program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution. The bus 26 provides a communications link between each of the components in the computing device 14. In addition, the computing device includes random access memory (RAM), a read-only memory (ROM), and an operating system (O/S). In general, the processor 20 executes computer program code (e.g., program control 44), which can be stored in the memory 22A and/or storage system 22B. The program control 44 controls and/or executes the processes of the invention. While executing the computer program code, the processor 20 can read and/or write data to/from memory 22A, storage system 22B, and/or I/O interface 24.
  • The computing device 14 is in communication with the external I/O device/resource 28 and the storage system 22B. For example, the I/O device 28 can comprise any device that enables an individual to interact with the computing device 14 or any device that enables the computing device 14 to communicate with one or more other computing devices using any type of communications link. The external I/O device/resource 28 may be for example, a handheld device, PDA, handset, keyboard, etc.
  • The computing device 14 further includes one or more analysis/simulation/modeling and/or design tools 25. For example, the tool 25 can be an EDA application, analysis tool, modeling tool and/or simulation tool implemented as one or more program code in the program control 44 stored in the memory 22A as separate or combined modules. In embodiments, chip designs, hardened components, elements, etc. may be stored in the storage system 22B, which may be, for example, a database.
  • The computing device 14 can also comprise any general purpose computing article of manufacture capable of executing computer program code installed thereon (e.g., a personal computer, server, etc.). However, it is understood that the computing device 14 is only representative of various possible equivalent-computing devices that may perform the processes described herein. To this extent, in embodiments, the functionality provided by the computing device 14 can be implemented by a computing article of manufacture that includes any combination of general and/or specific purpose hardware and/or computer program code. In each embodiment, the program code and hardware can be created using standard programming and engineering techniques, respectively.
  • Similarly, the computing infrastructure 12 is only illustrative of various types of computer infrastructures for implementing the invention. For example, in embodiments, the server 12 comprises two or more computing devices (e.g., a server cluster) that communicate over any type of communications link, such as a network, a shared memory, or the like, to perform the process described herein. Further, while performing the processes described herein, one or more computing devices on the server 12 can communicate with one or more other computing devices external to the server 12 using any type of communications link. The communications link can comprise any combination of wired and/or wireless links; any combination of one or more types of networks (e.g., the Internet, a wide area network, a local area network, a virtual private network, etc.); and/or utilize any combination of transmission techniques and protocols.
  • Exemplary Flow Diagrams
  • FIGS. 2 and 3 illustrate a process flow in accordance with aspects of the invention. The steps of FIGS. 2 and 3 may be implemented in the environment of FIG. 1, for example. The flow diagrams may equally represent a high-level block diagram or a swim-lane diagram of the invention. The flowchart and/or block diagrams in FIGS. 2 and 3 illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart, block diagram or swim-lane diagram may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figure. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. Each block of each flowchart and combinations of the flowchart illustration can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions and/or software, as described above.
  • FIG. 2 shows a flow diagram used, for example, in semiconductor IC logic design in accordance with aspects of the invention. At step 200, an existing microprocessor design is obtained. The design may be, for example, Verilog/VHDL or other type of schematic. At step 205, the user (e.g., program control) can select a reliability grade, representing the desired immunity to an ionizing radiation event, for example. The reliability grade can be, for example, a numerical score (e.g., 1-5), where 1 is the highest grade (most reliability). The reliability grade may be based on a desired radiation hardness required by the design and, in embodiments, may take into account many different trade-offs such as, for example, cost, efficiency and size of the final design. In more specific examples, factors to consider for the reliability grade may include, amongst others:
      • failure over a predetermined time period;
      • packaging materials that produce secondary (spallation) ions that cause SEUs;
      • failure rate to a specific flux;
      • reliability of the final design, e.g., 100% reliability vs. 50% reliability;
      • cost of the final design;
      • size of the final design; and/or
      • probability of failure at certain energy levels of the final design.
  • Optional step 210 is provided specifically for a memory array. For example, in optional step 210, the present invention can use an Error Correction Code (ECC) scheme for a DRAM or SRAM in order to improve robustness of the memory array, e.g., reliability of the memory. For example, the present invention can use a novel ECC scheme to improve the radiation immunity of DRAM or SRAM memory chips. As should be understood by those of skill in the art, the ECC is denser than a stacked transistor memory cell, but will use more power than the stacked transistor memory cell. A detailed discussion of the ECC scheme is described with reference to FIGS. 4 and 5.
  • At step 215, a design choice can be selected by the program control, based on the selected reliability grade. Step 215 can include, for example, providing immunity to SEUs in the logic portions of the commercial design by identifying key devices and substituting them with an SEU-immune device or by substituting every logic gate in all or part of the design with a functionally equivalent gate composed of SEU-immune devices. In a more specific example, the design can include, amongst other substitutions: a triple modular redundancy; substitution of every transistor by a stacked device for complementary CMOS gates (e.g., as disclosed in application Ser. No. 12/408,205, filed on Mar. 20, 2009, which is incorporated by reference in its entirety herein); substitution of every latch with a DICE latch; and/or substitution of only the sensitive latches with an equivalent latch having stacked devices. Another example may include targeting of SOI technologies which are resistant to latch up. As should be known to those of skill in the art, there may be many tradeoffs between each of the above designs. For example, the replacement of each transistor by a stacked device will require a significantly larger, and hence more expensive, chip, but such design will also be the most reliable against SEUs.
  • At optional step 220, the program control selects a process enhancement such as, for example, silicon-rich-oxide (SRO) film. As should be understood by those of skill in the art, the SRO film can be an efficient and reliable tunneling injector for the low voltage application in a flash memory cell. In an ionization event, electrons (negative charges) and holes (positive charges) are generated within a oxide layer. For a regular silicon oxide layer, some of the generated charges can accumulate in the oxide layer and cause degradation in device characteristics, resulting in the circuits not to function properly. For a silicon-rich-oxide layer, the charges generated in it can leak out readily with negligible net charge accumulation in the oxide layer. At step 225, the chip is fabricated, using the selected design. The resulting combination will provide radiation hardened chips with much better combined power, density, function, and reliability than is available using currently used methods. The method is also scalable and will provide cost savings without the need for large capital investment and extensive and unique process development.
  • FIG. 3 shows a flow diagram describing the replacement of latches in non-array portions of an input design in accordance with aspects of the invention. In embodiments, the evaluation of the circuits can be repeated to evaluate charged particles from each known source. These sources can be, for example: (i) fragments from neutron interactions; (ii) alpha particles; (iii) wafer materials background; (iv) solder bump materials; and/or (v) packaging materials, amongst other sources. The steps of FIG. 3 are performed using an estimate of the number of particles of different types emitted by the sources in (i)-(v) above.
  • At step 300, the program control will obtain a commercially available design. At step 305, the program control uses charge-collection modeling, bipolar modeling, and/or circuit simulation to estimate amplitudes of Single Event Transients (SETs). In embodiments, the modeling and/or simulation are represented by the tool 25 of FIG. 1. The modeling and/or simulation are designed to determine the narrow pulse created by charge collected in combinational logic and captured by a clock edge, and the frequency of occurrence of the SETs. By way of example, an analysis tool (also represented as tool 25 of FIG. 1) such as, for example, Synopsys Primetime SI, can determine if pulse spikes propagate to an interconnect, gate silicon and inverter to a latch data input. If so, the program control can check whether the latch data input is being clocked to determine if the latch should be replaced.
  • More specifically, soft errors in logic circuits may be filtered out by the circuit itself and may not affect the circuit performance if the noise pulse hits a non-controlling pin to a logic gate. For instance, if a two input NAND gate has a 0 on one input, a 1 will be produced on the output, regardless of any input on the other input pin. Accordingly, it does not matter if the other input pin is subject to large or little noise, as that noise will be filtered and will not appear on the output of the NAND gate. Not taking this noise-filtering into account will make a failure analysis too conservative, and may improperly increase the determined probability of failure at a latch. Thus, the method of masking fails due to the state of the logic includes using switching factors or switching activity values to calculate a probability that any input will be in a controlling or non-controlling state. The program control of the present invention will use the same type of masking to determine switching probability as used in power analysis.
  • In particular, at step 310, the program control will flatten the circuit under test to the transistor-level and organize it into channel-connected-components (CCCs). At step 315, the program control will apply a variety of SETs to each CCC (appropriate for each CCC), each resulting in a noise pulse at the output of the CCC. At step 320, the program control will use a signal-integrity analysis tool (also represented as tool 25 of FIG. 1), improved with the use of current-source models for the CCC, to propagate the resulting noise pulse through logic and to latches. At step 325, the program control will evaluate the width of the SET noise pulse at the input of a latch. At step 330, the program control will evaluate the probability of capture by a clock edge and apply a logic masking factor. Logic masking factors may be determined from a variety of sources, including, for example: the use of simulation data to determine the probability that any signal is in a controlling or non-controlling state; the use of global switching factors to estimate the probability that any logic signal is in a controlling or non-controlling state; or per-instance estimated factors, which relate an individual noisy input signal to the number of other inputs to a circuit it propagates to, to compute a probability that the other inputs may be in a non-controlling state. For instance, with a 2 input NAND circuit, the other input has a ½ probability of being non-controlling, and the factor would be ½. A 3 input NAND would have a factor of ¼; etc.
  • At step 335, the program control will determine the probability of a logic failure based on the likelihood of a soft error propagating to and switching each latch. At step 340, the program control will accumulate results for each instance (i)-(v) to obtain a failure estimate for each latch. At step 345, the program control will replace each latch having an estimated failure rate greater than the target percentage. In embodiments, the target percentage may be a user-defined percentage.
  • The replacement of latches in the non-array portions of the input design (commercially available design) may be based on the reliability grade selected by the program control or designer, as discussed above. In the example described in FIG. 3, for a high reliability grade (high reliability device), every device may be replaced by a stacked device. For a lower reliability grade (lower reliability device), only the latches with a functionally equivalent latch having stacked devices or a DICE latches that have a likelihood of failure >x % will be replaced. Here, the value of “x” can be a user-defined percentage describing the degree of desired “hardening”.
  • FIG. 4 shows a two-bank memory system protected by a 137-bit ECC scheme in accordance with aspects of the present invention. The two-bank memory system shown in FIG. 4, for example, can be used as a replacement for a memory device, in step 210 of FIG. 2. Illustratively, by using the two-bank memory system of FIG. 4, it is possible to protect the memory array against radiation-induced soft errors and neutrino switching effects, for example, and hence recover from a single error. For example, as discussed in more detail below, recovery from a single error is possible by using a two dimensional array to store data bits in different word lines that are spaced far apart in order to spread data over a large area.
  • By way of background, single event upsets (SEU) are a significant problem for DRAM (dynamic random access memory) and SRAM (static random access memory) arrays in aerospace applications. To protect the memory in conventional systems, Error Correction Code (ECC) systems have been added to improve the radiation immunity of DRAM memory chips to perform a single error correct and double error correct (SEC/DEC) operations. However, in such systems, 8-groups of separate ECC words are interdigitated along a 1096 bit word line, and arranged so the 137-bits defining one electrical ECC word are separated by 8-physical bits. In this arrangement, a single SEU can affect up to 8 adjacent DRAM cells and still be correctable by the SEC/DEC system. However, the physical size of the memory storage cell is small enough that a single particle strike can generate an electron cloud sufficient to destroy the data within a large grouping of DRAM cells. For this reason, known techniques of interdigitating the ECC word are by themselves not sufficient to provide significant immunity to radiation. An additional problem with known techniques is that DRAM arrays have much shorter word lines than the currently used 16 MB technology. Shorter word lines, in turn, make it difficult to physically separate the ECC bits far enough apart to minimize the effects of a SEU, with efficient ECC codes of 64 to 128 data bits per ECC word. A need therefore exists to improve the SEU immunity of a DRAM array used in a radiation hardened application.
  • To improve current technologies, the memory architecture shown in FIG. 4 comprises an ECC word stored in a two-dimensional space to minimize SEU effects on a DRAM array. In this arrangement, the interdigitation technique is augmented by spacing out the electrical locations of a single ECC word to several word lines residing in several array segments.
  • More specifically, FIG. 4 shows a two-bank memory system (e.g., Bank A and Bank B) protected by a 137-bit ECC system 400 designed to transfer an ECC word to and from the memory banks on an overhead global data line. The 137 bit ECC system includes 9 check bits. For Bank B, the 137-bit ECC word 400 has a first bit, B1, located in array segment 3, and subsequent bits B2, B3, B4 are located in array segments 2, 1 and 0, respectively. For Bank A, the 137-bit ECC word 400 has a first bit, B5, located in array segment 3, and subsequent bits B6, B7, B8 are located in array segments 2, 1 and 0, respectively. Thus, in this arrangement, the physical locations of each bit are scattered along an array wordline segment and across a plurality of array segments such that a SEU is unlikely to affect more than 1 bit with the ECC word.
  • In this arrangement, the ECC protected memory architecture has the improvement over the known systems of simply storing the ECC word in interdigitated locations along a word line. That is, in this configuration, the physical location of an electrical ECC word can be spread out within a memory array in a two-dimensional fashion to minimize the effects of radiation. In this manner, the SEU damage is confined to a single bit residing in several ECC words and is therefore recoverable by a SEC/DEC system (because the ECC word is spread out over several array segments). (This is compared to a conventional system where in a SEU, an electron cloud could affect the data integrity of a large group of memory cells within a single ECC word.)
  • FIG. 5 shows a detail of the array segment used in FIG. 4. In the arrangement shown, within each array segment, a 1-of-4 decode is performed by a column select signal Ac<1:0> to select a DRAM cell location within the array segments. More specifically, an overhead global data line 500 is connected to 1-of-4 MUX devices 505 and column select logic to select a particular sense amp 510 and bit line pair 515. The MUX devices 505 are responsive to a column decode 520 controlled by addresses Ac<1:0>, and also allow data to pass from the sense amps 510 to the global data line 500. A particular memory cell 525 is selected along a true/complement pair of array bit lines by the word decoder 530 with input Aw<3:0>. Using multiple of these array segments allows an ECC word to be scattered across a multiple bank memory array to minimize the effects of a SEU and can essentially eliminate data loss from a SEU event.
  • In another example, the total ionizing dose (TID) resistance can be provided by use of a method to reduce backchannel and lateral isolation leakage. One example is the use of Silicon Rich Oxide (SRO). Another example is the use of liners in the STI fill. These examples can be achieved in an existing tool with a change to the gas flow during oxide deposition. More specifically, in one implementation, TID enhancement can include the deposition of High Refractive Index Silicon Rich Silicon Dioxide using an AMAT 5000 HDP (High Density Plasma) system. The leakage properties of this silicon rich oxide film are far superior to conventional SiO2 following Total Ionizing Dose exposure (see, e.g., FIG. 6). The SRO has no known harmful effects on NFET and PFET leakage characteristics and greatly improves the TID results.
  • FIG. 7 shows a block diagram of an exemplary design flow 900 used for example, in semiconductor IC logic design, simulation, test, layout, and manufacture. Design flow 900 includes processes, machines and/or mechanisms for processing design structures or devices to generate logically or otherwise functionally equivalent representations of the design structures and/or devices described above and shown in FIGS. 1-5, for example. The design structures processed and/or generated by design flow 900 may be encoded on machine-readable transmission or storage media to include data and/or instructions that when executed or otherwise processed on a data processing system generate a logically, structurally, mechanically, or otherwise functionally equivalent representation of hardware components, circuits, devices, or systems. Machines include, but are not limited to, any machine used in an IC design process, such as designing, manufacturing, or simulating a circuit, component, device, or system. For example, machines may include: lithography machines, machines and/or equipment for generating masks (e.g. e-beam writers), computers or equipment for simulating design structures, any apparatus used in the manufacturing or test process, or any machines for programming functionally equivalent representations of the design structures into any medium (e.g. a machine for programming a programmable gate array).
  • Design flow 900 may vary depending on the type of representation being designed. For example, a design flow 900 for building an application specific IC (ASIC) may differ from a design flow 900 for designing a standard component or from a design flow 900 for instantiating the design into a programmable array, for example a programmable gate array (PGA) or a field programmable gate array (FPGA) offered by Altera® Inc. or Xilinx® Inc.
  • FIG. 7 illustrates multiple such design structures including an input design structure 920 that is preferably processed by a design process 910. Design structure 920 may be a logical simulation design structure generated and processed by design process 910 to produce a logically equivalent functional representation of a hardware device. Design structure 920 may also or alternatively comprise data and/or program instructions that when processed by design process 910, generate a functional representation of the physical structure of a hardware device. Whether representing functional and/or structural design features, design structure 920 may be generated using electronic computer-aided design (ECAD) such as implemented by a core developer/designer. When encoded on a machine-readable data transmission, gate array, or storage medium, design structure 920 may be accessed and processed by one or more hardware and/or software modules within design process 910 to simulate or otherwise functionally represent an electronic component, circuit, electronic or logic module, apparatus, device, or system such as those shown in FIGS. 1-5, for example. As such, design structure 920 may comprise files or other data structures including human and/or machine-readable source code, compiled structures, and computer-executable code structures that when processed by a design or simulation data processing system, functionally simulate or otherwise represent circuits or other levels of hardware logic design. Such data structures may include hardware-description language (HDL) design entities or other data structures conforming to and/or compatible with lower-level HDL design languages such as Verilog and VHDL, and/or higher level design languages such as C or C++.
  • Design process 910 preferably employs and incorporates hardware and/or software modules for synthesizing, translating, or otherwise processing a design/simulation functional equivalent of the components, circuits, devices, or logic structures shown in FIGS. 1-5, for example, to generate a netlist 980 which may contain design structures such as design structure 920. Netlist 980 may comprise, for example, compiled or otherwise processed data structures representing a list of wires, discrete components, logic gates, control circuits, I/O devices, models, etc. that describes the connections to other elements and circuits in an integrated circuit design. Netlist 980 may be synthesized using an iterative process in which netlist 980 is resynthesized one or more times depending on design specifications and parameters for the device. As with other design structure types described herein, netlist 980 may be recorded on a machine-readable data storage medium or programmed into a programmable gate array. The medium may be a non-volatile storage medium such as a magnetic or optical disk drive, a programmable gate array, a compact flash, or other flash memory. Additionally, or in the alternative, the medium may be a system or cache memory, buffer space, or electrically or optically conductive devices and materials on which data packets may be transmitted and intermediately stored via the Internet, or other networking suitable means.
  • Design process 910 may include hardware and software modules for processing a variety of input data structure types including netlist 980. Such data structure types may reside, for example, within library elements 930 and include a set of commonly used elements, circuits, and devices, including models, layouts, and symbolic representations, for a given manufacturing technology (e.g., different technology nodes, 32 nm, 45 nm, 90 nm, etc.). The data structure types may further include design specifications 940, characterization data 950, verification data 960, design rules 970, and test data files 985 which may include input test patterns, output test results, and other testing information. Design process 910 may further include, for example, standard mechanical design processes such as stress analysis, thermal analysis, mechanical event simulation, process simulation for operations such as casting, molding, and die press forming, etc. One of ordinary skill in the art of mechanical design can appreciate the extent of possible mechanical design tools and applications used in design process 910 without deviating from the scope and spirit of the invention. Design process 910 may also include modules for performing standard circuit design processes such as timing analysis, verification, design rule checking, place and route operations, etc.
  • Design process 910 employs and incorporates logic and physical design tools such as HDL compilers and simulation model build tools to process design structure 920 together with some or all of the depicted supporting data structures along with any additional mechanical design or data (if applicable), to generate a second design structure 990. Design structure 990 resides on a storage medium or programmable gate array in a data format used for the exchange of data of mechanical devices and structures (e.g. information stored in a IGES, DXF, Parasolid XT, JT, DRG, or any other suitable format for storing or rendering such mechanical design structures). Similar to design structure 920, design structure 990 preferably comprises one or more files, data structures, or other computer-encoded data or instructions that reside on transmission or data storage media and that when processed by an ECAD system generate a logically or otherwise functionally equivalent form of one or more of the embodiments of the invention shown in FIGS. 1-5, for example. In one embodiment, design structure 990 may comprise a compiled, executable HDL simulation model that functionally simulates the devices shown in FIGS. 1-5, for example.
  • Design structure 990 may also employ a data format used for the exchange of layout data of integrated circuits and/or symbolic data format (e.g. information stored in a GDSII (GDS2), GL1, OASIS, map files, or any other suitable format for storing such design data structures). Design structure 990 may comprise information such as, for example, symbolic data, map files, test data files, design content files, manufacturing data, layout parameters, wires, levels of metal, vias, shapes, data for routing through the manufacturing line, and any other data required by a manufacturer or other designer/developer to produce a device or structure as described above and shown in FIGS. 1-5, for example. Design structure 990 may then proceed to a stage 995 where, for example, design structure 990: proceeds to tape-out, is released to manufacturing, is released to a mask house, is sent to another design house, is sent back to the customer, etc.
  • The method as described above is used in the fabrication of integrated circuit chips. The resulting integrated circuit chips can be distributed by the fabricator in raw wafer form (that is, as a single wafer that has multiple unpackaged chips), as a bare die, or in a packaged form. In the latter case the chip is mounted in a single chip package (such as a plastic carrier, with leads that are affixed to a motherboard or other higher level carrier) or in a multichip package (such as a ceramic carrier that has either or both surface interconnections or buried interconnections). In any case the chip is then integrated with other chips, discrete circuit elements, and/or other signal processing devices as part of either (a) an intermediate product, such as a motherboard, or (b) an end product. The end product can be any product that includes integrated circuit chips, ranging from toys and other low-end applications to advanced computer products having a display, a keyboard or other input device, and a central processor.
  • The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
  • The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below, where applicable, are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated. Accordingly, while the invention has been described in terms of embodiments, those of skill in the art will recognize that the invention can be practiced with modifications and in the spirit and scope of the appended claims.

Claims (25)

1. A method implemented in a computing infrastructure, comprising:
evaluating a probability that one or more components of an existing commercial design will be affected by a single event upset (SEU); and
replacing the one or more components with a component immune to the SEU to create a final device.
2. The method of claim 1, wherein:
sensitive areas of logic of the existing commercial design are rendered immune to the SEU by substituting logic gates containing at least one stacked device;
all digital logic of the existing commercial design are rendered immune to the SEU by substituting logic gates containing by least one stacked field effect transistor (FET) device; and
SRAM and DRAM arrays are rendered immune to the SEU by use of Error Correction Code (ECC) in peripheral logic of the arrays.
3. The method of claim 1, further comprising selecting a reliability grade, representing a desired immunity to an ionizing radiation event.
4. The method of claim 3, wherein the reliability grade takes into account different factors including at least one of cost, efficiency and size of the final design.
5. The method of claim 3, wherein the reliability grade takes into account different factors including at least one of: failure over a predetermined time period; failure rate to a specific flux; reliability of the final design; cost of the final design; size of the final design; and probability of failure at certain energy levels.
6. The method of claim 1, further comprising using an Error Correction Code (ECC) scheme for a DRAM or SRAM to improve robustness of a memory array, wherein the ECC scheme includes physical locations of each bit scattered along an array segment and within a plurality of array segments.
7. The method of claim 1, wherein the replacement includes providing immunity to the final device in logic portions by substituting every logic gate in all or part of the existing commercial design with a functionally equivalent gate composed of SEU-immune devices.
8. The method of claim 1, wherein the final design includes at least one of: a triple modular redundancy, a substitution of every transistor by a stacked device for complementary CMOS gates in SOI technologies which are resistant to latch up; a substitution of every latch with a DICE latch; a substitution of only sensitive latches with an equivalent latch having at least one stacked device in SOI technologies which are resistant to latch up.
9. The method of claim 1, further comprising selecting a process enhancement to provide an immune device.
10. The method of claim 9, wherein the process enhancement includes a silicon-rich-oxide (SRO) film.
11. A method, comprising:
evaluating a currently available design using modeling and/or simulation techniques to determine whether pulse spikes cause latch ups;
flattening the design to a transistor-level and organizing it into channel-connected-components (CCCs);
applying a variety of Single Event Transients (SETs) to each CCC resulting in a noise pulse at an output of the each CCC;
using a signal-integrity analysis tool implemented in a computing infrastructure to propagate a resulting noise pulse through logic and to each of the latches;
evaluating a width of the noise pulse at an input of each of the latches;
evaluating a probability of capture by clock edge and applying a logical masking factor;
determining a probability of a logic failure based on a likelihood of a soft error propagating to and switching each of the latches; and
replacing each of the latches having an estimated logic failure rate greater than a target percentage.
12. The method of claim 11, where the signal-integrity analysis tool is improved with current-source models for the CCC.
13. The method of claim 12, further comprising accumulating results for each known source to obtain a failure estimate for each of the latches.
14. The method of claim 11, wherein the replacement of each of the latches is in non-array portions of an input design.
15. The method of claim 11, wherein the evaluation of the currently available design are repeated to evaluate charged particles from each known source.
16. The method of claim 15, wherein each known source includes at least one of: fragments from neutron interactions; alpha particles; wafer materials background; solder bumps; and packaging.
17. The method of claim 11, wherein the modeling and/or simulation techniques include at least one of: charge-collection modeling, bipolar modeling, and circuit simulation to estimate amplitudes of Single Event Transients (SETs).
18. The method of claim 17, wherein the modeling and/or simulation techniques determine a narrow pulse created by charge collected in combinational logic and captured by a clock edge, and frequency of occurrence of the SETs.
19. The method of claim 11, wherein the replacement of each of the latches in non-array portions of the input design is based on a reliability grade.
20. The method of claim 19, wherein:
for a high reliability grade, every device is replaced by a stacked device; and
for a lower reliability grade, only latches having a likelihood of failure >x % are replaced with a functionally equivalent latch having stacked devices or a DICE latch.
21. A method comprising:
obtaining an existing microprocessor design;
targeting a low-power process in the existing microprocessor design; and
performing a physical-design (PD) step with robust power distribution to provide immunity to neutron bursts, wherein the robust power distribution includes at least one of:
providing immunity to SEUs in logic portions of the microprocessor design; and
providing immunity to SEUs in memory portions of the microprocessor design.
22. The method of claim 21, wherein:
providing immunity to SEUs in logic portions of the microprocessor design includes identifying key devices and substituting them with an SEU-immune stacked device in SOI technologies which are resistant to latch up or by substituting every logic gate in the all or part of the design with a functionally equivalent gate composed of SEU-immune stacked devices in SOI technologies which are resistant to latch up; and
providing immunity to SEUs in memory portions of the microprocessor design includes using an error correcting code (ECC) scheme to reduce sensitivity to failure of adjacent FETs in peripheral logic of the arrays.
23. A memory array comprising a multiple segment memory system which is protected by an ECC scheme used as a replacement for a memory device, wherein the multiple segment memory system transfers an ECC word to and from separate memory segments on global data lines, wherein bits of an ECC word are scattered among multiple wordlines, the wordlines being located in separate memory segments such that physical locations of each ECC bit are separated thereby protecting the memory array from radiation induced errors.
24. The memory array of claim 23, wherein a SEU will affect no more than 1 bit within the ECC word.
25. The memory array of claim 23, wherein each bit is located on a separate wordline in each of the separate memory banks.
US12/579,159 2009-10-14 2009-10-14 Method for conversion of commercial microprocessor to radiation-hardened processor and resulting processor Abandoned US20110088008A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/579,159 US20110088008A1 (en) 2009-10-14 2009-10-14 Method for conversion of commercial microprocessor to radiation-hardened processor and resulting processor
US14/151,866 US9646125B2 (en) 2009-10-14 2014-01-10 Method for conversion of commercial microprocessor to radiation-hardened processor and resulting processor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/579,159 US20110088008A1 (en) 2009-10-14 2009-10-14 Method for conversion of commercial microprocessor to radiation-hardened processor and resulting processor

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/151,866 Continuation US9646125B2 (en) 2009-10-14 2014-01-10 Method for conversion of commercial microprocessor to radiation-hardened processor and resulting processor

Publications (1)

Publication Number Publication Date
US20110088008A1 true US20110088008A1 (en) 2011-04-14

Family

ID=43855829

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/579,159 Abandoned US20110088008A1 (en) 2009-10-14 2009-10-14 Method for conversion of commercial microprocessor to radiation-hardened processor and resulting processor
US14/151,866 Expired - Fee Related US9646125B2 (en) 2009-10-14 2014-01-10 Method for conversion of commercial microprocessor to radiation-hardened processor and resulting processor

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/151,866 Expired - Fee Related US9646125B2 (en) 2009-10-14 2014-01-10 Method for conversion of commercial microprocessor to radiation-hardened processor and resulting processor

Country Status (1)

Country Link
US (2) US20110088008A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120198394A1 (en) * 2011-01-31 2012-08-02 Pikus Fedor G Method For Improving Circuit Design Robustness
US20130265080A1 (en) * 2012-01-18 2013-10-10 International Business Machines Corporation Soft error resilient fpga
US20140197863A1 (en) * 2013-01-15 2014-07-17 International Business Machines Corporation Placement of storage cells on an integrated circuit
US8863057B2 (en) * 2012-11-07 2014-10-14 Globalfoundries Inc. Method for selectively modeling narrow-width stacked device performance
US9021328B2 (en) 2013-01-15 2015-04-28 International Business Machines Corporation Shared error protection for register banks
US9043683B2 (en) 2013-01-23 2015-05-26 International Business Machines Corporation Error protection for integrated circuits
US20150286772A1 (en) * 2014-04-07 2015-10-08 TallannQuest LLC Method and system for computer-aided design of radiation-hardened integrated circuits
US9201727B2 (en) 2013-01-15 2015-12-01 International Business Machines Corporation Error protection for a data bus
US20160315705A1 (en) * 2013-12-11 2016-10-27 Areva Gmbh Nuclear power plant having a signal transmission system and method for transmitting a measured value
CN107907758A (en) * 2017-10-23 2018-04-13 西北核技术研究所 A kind of Online Transaction Processing and method of CMOS technology microcontroller 80C196 radiation effects
CN112313520A (en) * 2018-06-21 2021-02-02 赛峰电子与防务公司 Method for producing a circuit optimized for protection against radiation
US11372717B2 (en) * 2019-08-30 2022-06-28 Qualcomm Incorporated Memory with system ECC

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107908867A (en) * 2017-11-14 2018-04-13 中国科学院上海微系统与信息技术研究所 A kind of layout design method of triplication redundancy circuit
CN108181521A (en) * 2017-11-29 2018-06-19 上海精密计量测试研究所 For the equipment and detection method of the detection of cmos image sensor single particle effect
US20220366113A1 (en) * 2021-05-13 2022-11-17 International Business Machines Corporation Protecting Against Emission Based Side Channel Detection

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5022027A (en) * 1982-05-27 1991-06-04 The United States Of America As Represented By The Secretary Of The Navy Communications interface and system for radiation recovery of a microprocessor portion thereof
US5134616A (en) * 1990-02-13 1992-07-28 International Business Machines Corporation Dynamic ram with on-chip ecc and optimized bit and word redundancy
US5260952A (en) * 1991-04-30 1993-11-09 Ibm Corporation Fault tolerant logic system
US5995430A (en) * 1997-02-21 1999-11-30 Kabushiki Kaisha Toshiba Semiconductor memory device
US6157560A (en) * 1999-01-25 2000-12-05 Winbond Electronics Corporation Memory array datapath architecture
US6339548B1 (en) * 1993-12-28 2002-01-15 Nippon Steel Corporation Data reading method in semiconductor storage device capable of storing three- or multi-valued data in one memory cell
US20020110027A1 (en) * 2001-02-09 2002-08-15 Hirofumi Nakano Semiconductor data storing circuit device, method of checking the device and method of relieving the device from defective cell
US20020154553A1 (en) * 1999-12-06 2002-10-24 Alex Shubat System and method for redundancy implementation in a semiconductor device
US20030012053A1 (en) * 2001-07-12 2003-01-16 Micron Technology, Inc. Dual bit line driver for memory
US20030028712A1 (en) * 2001-07-31 2003-02-06 Hitachi, Ltd. Semiconductor memory
US20060069941A1 (en) * 2004-09-14 2006-03-30 Seagate Technology Llc Embedded system with reduced susceptibility to single event upset effects
US20060119410A1 (en) * 2004-12-06 2006-06-08 Honeywell International Inc. Pulse-rejecting circuit for suppressing single-event transients
US20060194454A1 (en) * 2005-02-28 2006-08-31 Hughes Harold L Technique to radiation-harden trench refill oxides
US7103522B1 (en) * 1999-06-10 2006-09-05 The Trustees Of Columbia University In The City Of New York Methods for estimating the body voltage of digital partially depleted silicon-on-insulator circuits
US20070198873A1 (en) * 2005-12-03 2007-08-23 Mira Limited Method of Operation of a Microprocessor
US20080235557A1 (en) * 2007-03-22 2008-09-25 Hynix Semiconductor Inc. Semiconductor memory device
US20080281572A1 (en) * 2007-05-10 2008-11-13 Ruchir Puri Integrated circuit (ic) design method and method of analyzing radiation-induced single-event upsets in cmos logic designs
US7535213B1 (en) * 2005-08-29 2009-05-19 Xilinx, Inc. Method and system for prediction of atmospheric upsets in an integrated circuit
US20090134925A1 (en) * 2007-09-19 2009-05-28 International Business Machines Corporation Apparatus and method for hardening latches in soi cmos devices
US7598773B2 (en) * 2007-10-29 2009-10-06 Itt Manufacturing Enterprises, Inc. Radiation hardened logic circuits
US20110025372A1 (en) * 2009-07-29 2011-02-03 The Boeing Company Method and apparatus for reducing radiation and cross-talk induced data errors

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7260742B2 (en) * 2003-01-28 2007-08-21 Czajkowski David R SEU and SEFI fault tolerant computer
US8065644B1 (en) * 2008-03-14 2011-11-22 Xilinx, Inc. Reducing susceptibility of circuit designs to single event upsets

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5022027A (en) * 1982-05-27 1991-06-04 The United States Of America As Represented By The Secretary Of The Navy Communications interface and system for radiation recovery of a microprocessor portion thereof
US5134616A (en) * 1990-02-13 1992-07-28 International Business Machines Corporation Dynamic ram with on-chip ecc and optimized bit and word redundancy
US5260952A (en) * 1991-04-30 1993-11-09 Ibm Corporation Fault tolerant logic system
US6339548B1 (en) * 1993-12-28 2002-01-15 Nippon Steel Corporation Data reading method in semiconductor storage device capable of storing three- or multi-valued data in one memory cell
US5995430A (en) * 1997-02-21 1999-11-30 Kabushiki Kaisha Toshiba Semiconductor memory device
US6157560A (en) * 1999-01-25 2000-12-05 Winbond Electronics Corporation Memory array datapath architecture
US7103522B1 (en) * 1999-06-10 2006-09-05 The Trustees Of Columbia University In The City Of New York Methods for estimating the body voltage of digital partially depleted silicon-on-insulator circuits
US20020154553A1 (en) * 1999-12-06 2002-10-24 Alex Shubat System and method for redundancy implementation in a semiconductor device
US20020110027A1 (en) * 2001-02-09 2002-08-15 Hirofumi Nakano Semiconductor data storing circuit device, method of checking the device and method of relieving the device from defective cell
US20030012053A1 (en) * 2001-07-12 2003-01-16 Micron Technology, Inc. Dual bit line driver for memory
US20030028712A1 (en) * 2001-07-31 2003-02-06 Hitachi, Ltd. Semiconductor memory
US20060069941A1 (en) * 2004-09-14 2006-03-30 Seagate Technology Llc Embedded system with reduced susceptibility to single event upset effects
US20060119410A1 (en) * 2004-12-06 2006-06-08 Honeywell International Inc. Pulse-rejecting circuit for suppressing single-event transients
US20060194454A1 (en) * 2005-02-28 2006-08-31 Hughes Harold L Technique to radiation-harden trench refill oxides
US7535213B1 (en) * 2005-08-29 2009-05-19 Xilinx, Inc. Method and system for prediction of atmospheric upsets in an integrated circuit
US20070198873A1 (en) * 2005-12-03 2007-08-23 Mira Limited Method of Operation of a Microprocessor
US20080235557A1 (en) * 2007-03-22 2008-09-25 Hynix Semiconductor Inc. Semiconductor memory device
US20080281572A1 (en) * 2007-05-10 2008-11-13 Ruchir Puri Integrated circuit (ic) design method and method of analyzing radiation-induced single-event upsets in cmos logic designs
US20090134925A1 (en) * 2007-09-19 2009-05-28 International Business Machines Corporation Apparatus and method for hardening latches in soi cmos devices
US7598773B2 (en) * 2007-10-29 2009-10-06 Itt Manufacturing Enterprises, Inc. Radiation hardened logic circuits
US20110025372A1 (en) * 2009-07-29 2011-02-03 The Boeing Company Method and apparatus for reducing radiation and cross-talk induced data errors

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A. Mason, "Lecture Notes Ch. 13", Spring 2008. Retrieved from http://www.egr.msu.edu/classes/ece410/mason/ *
Wikipedia, "Dynamic random-access memory", 30 September 2009, http://en.wikipedia.org/w/index.php?title=Dynamic_random-access_memory&oldid=317181940 *

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120198394A1 (en) * 2011-01-31 2012-08-02 Pikus Fedor G Method For Improving Circuit Design Robustness
US20130265080A1 (en) * 2012-01-18 2013-10-10 International Business Machines Corporation Soft error resilient fpga
US9166587B2 (en) * 2012-01-18 2015-10-20 International Business Machines Corporation Soft error resilient FPGA
US8863057B2 (en) * 2012-11-07 2014-10-14 Globalfoundries Inc. Method for selectively modeling narrow-width stacked device performance
US9021328B2 (en) 2013-01-15 2015-04-28 International Business Machines Corporation Shared error protection for register banks
US9041428B2 (en) * 2013-01-15 2015-05-26 International Business Machines Corporation Placement of storage cells on an integrated circuit
US20140197863A1 (en) * 2013-01-15 2014-07-17 International Business Machines Corporation Placement of storage cells on an integrated circuit
US9201727B2 (en) 2013-01-15 2015-12-01 International Business Machines Corporation Error protection for a data bus
US9043683B2 (en) 2013-01-23 2015-05-26 International Business Machines Corporation Error protection for integrated circuits
US20160315705A1 (en) * 2013-12-11 2016-10-27 Areva Gmbh Nuclear power plant having a signal transmission system and method for transmitting a measured value
US9569583B2 (en) * 2014-04-07 2017-02-14 TallannQuest LLC Method and system for computer-aided design of radiation-hardened integrated circuits
US20150286772A1 (en) * 2014-04-07 2015-10-08 TallannQuest LLC Method and system for computer-aided design of radiation-hardened integrated circuits
US20170098028A1 (en) * 2014-04-07 2017-04-06 TallannQuest LLC Method and system for computer-aided design of radiation-hardened integrated circuits
US9779203B2 (en) * 2014-04-07 2017-10-03 TallannQuest LLC Method and system for computer-aided design of radiation-hardened integrated circuits
US20180096096A1 (en) * 2014-04-07 2018-04-05 TallannQuest LLC Method and system for computer-aided design of radiation-hardened integrated circuits
US10242151B2 (en) * 2014-04-07 2019-03-26 TallannQuest LLC Method and system for computer-aided design of radiation-hardened integrated circuits
CN107907758A (en) * 2017-10-23 2018-04-13 西北核技术研究所 A kind of Online Transaction Processing and method of CMOS technology microcontroller 80C196 radiation effects
CN112313520A (en) * 2018-06-21 2021-02-02 赛峰电子与防务公司 Method for producing a circuit optimized for protection against radiation
US11372717B2 (en) * 2019-08-30 2022-06-28 Qualcomm Incorporated Memory with system ECC

Also Published As

Publication number Publication date
US20140258958A1 (en) 2014-09-11
US9646125B2 (en) 2017-05-09

Similar Documents

Publication Publication Date Title
US9646125B2 (en) Method for conversion of commercial microprocessor to radiation-hardened processor and resulting processor
Ibe et al. Impact of scaling on neutron-induced soft error in SRAMs from a 250 nm to a 22 nm design rule
Wang et al. Single event upset: An embedded tutorial
Kanekawa et al. Dependability in electronic systems: mitigation of hardware failures, soft errors, and electro-magnetic disturbances
Baeg et al. SRAM interleaving distance selection with a soft error failure model
D'Alessio et al. Design of a nanometric CMOS memory cell for hardening to a single event with a multiple-node upset
Bhuva et al. Multi-cell soft errors at advanced technology nodes
Ibe Terrestrial radiation effects in ULSI devices and electronic systems
TWI519071B (en) Single event transient and upset mitigation for silicon-on-insulator cmos technology
Rathod et al. Radiation effects in MOS-based devices and circuits: A review
Pavan Kumar et al. A review on radiation‐hardened memory cells for space and terrestrial applications
Hashimoto et al. Characterizing SRAM and FF soft error rates with measurement and simulation
KleinOsowski et al. Circuit design and modeling for soft errors
Uemura et al. Investigation of multi cell upset in sequential logic and validity of redundancy technique
Li et al. SEU Performance of RHBD Flip-Flops Using Guard-Gates at 22-nm FDSOI Technology Node
Azimi et al. On the evaluation of SEEs on open-source embedded static RAMs
Lin et al. Modeling and design of a nanoscale memory cell for hardening to a single event with multiple node upset
Alghareb Soft-error resilience framework for reliable and energy-efficient CMOS logic and spintronic memory architectures
Li et al. Simulation and experimental evaluation of a soft error tolerant layout for SRAM 6T bitcell in 65nm technology
US11652481B2 (en) Designing single event upset latches
Shi et al. Single Event Upset Evaluation for a 28-nm FDSOI SRAM Type Buffer in an ARM Processor
Ibe et al. Radiation-induced soft errors
Guo et al. The Bitmap Decryption Model on Interleaved SRAM Using Multiple-Bit Upset Analysis
Naseer A framework for soft error tolerant SRAM design
Tian Study of Radiation-Tolerant SRAM Design

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FIFIELD, JOHN A.;HAKEY, MARK C.;HIBBELER, JASON D.;AND OTHERS;SIGNING DATES FROM 20090923 TO 20091012;REEL/FRAME:023377/0388

AS Assignment

Owner name: GLOBALFOUNDRIES U.S. 2 LLC, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:036550/0001

Effective date: 20150629

AS Assignment

Owner name: GLOBALFOUNDRIES INC., CAYMAN ISLANDS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GLOBALFOUNDRIES U.S. 2 LLC;GLOBALFOUNDRIES U.S. INC.;REEL/FRAME:036779/0001

Effective date: 20150910

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: GLOBALFOUNDRIES U.S. INC., NEW YORK

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION;REEL/FRAME:056987/0001

Effective date: 20201117